Jan-Christoph Küster
Jan-Christoph Küster
ANU-NICTA PhD Student
Verified email at anu.edu.au - Homepage
TitleCited byYear
From propositional to first-order monitoring
A Bauer, JC Küster, G Vegliach
International Conference on Runtime Verification, 59-75, 2013
542013
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
462011
Runtime Verification meets Android Security
A Bauer, JC Küster, G Vegliach
322012
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
International Working Conference on Requirements Engineering: Foundation for …, 2012
212012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
International Symposium on Engineering Secure Software and Systems, 14-21, 2012
162012
The ins and outs of first-order runtime verification
A Bauer, JC Küster, G Vegliach
Formal Methods in System Design 46 (3), 286-316, 2015
142015
Monitoring real android malware
JC Küster, A Bauer
Runtime Verification, 136-152, 2015
112015
Platform-Centric Android Monitoring---Modular and Efficient
JC Küster, A Bauer
arXiv preprint arXiv:1406.2041, 2014
62014
Runtime verification on data-carrying traces
JC Kuester
The Australian National University, 2016
12016
From propositional to first-order monitoring
JC Küster
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches
B Kristian, S Faßbender, M Heisel, JC Küster, H Schmidt
Robotfußballer im virtuellen Raum
JC Küster, A Schulte
The system can't perform the operation now. Try again later.
Articles 1–12